Hong, Geng
5908  results:
Search for persons X
?
2

Interface Illusions: Uncovering the Rise of Visual Scams in..:

, In: Proceedings of the ACM on Web Conference 2024,
Ye, Guoyi ; Hong, Geng ; Zhang, Yuan. - p. 1585-1595 , 2024
 
?
4

Revealing and Analyzing the Visual Scams of Cryptocurrency ..:

, In: Proceedings of the ACM Turing Award Celebration Conference - China 2023,
Ye, Guoyi ; Wu, Mengying ; Hong, Geng. - p. 148-149 , 2023
 
?
5

Understanding and Detecting Abused Image Hosting Modules as..:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
Hong, Geng ; Wu, Mengying ; Chen, Pei... - p. 3213-3227 , 2023
 
?
6

Under the Dark: A Systematical Study of Stealthy Mining Poo..:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
Zhang, Zhenrui ; Hong, Geng ; Li, Xiang... - p. 326-340 , 2023
 
?
8

Analyzing Ground-Truth Data of Mobile Gambling Scams:

, In: 2022 IEEE Symposium on Security and Privacy (SP),
Hong, Geng ; Yang, Zhemin ; Yang, Sen... - p. 2176-2193 , 2022
 
?
10

How Android developers handle evolution-induced API compati..:

, In: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering,
Xia, Hao ; Zhang, Yuan ; Zhou, Yingtian... - p. 886-898 , 2020
 
?
11

Research on the Risk Prevention of Government Purchase of P..:

Yanfang, Chen ; Hong, Geng
International Journal of Business and Management.  13 (2018)  2 - p. 187 , 2018
 
?
12

How You Get Shot in the Back : A Systematical Study abou..:

, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
Hong, Geng ; Yang, Zhemin ; Yang, Sen... - p. 1701-1713 , 2018
 
?
13

Invetter : Locating Insecure Input Validations in Androi..:

, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
Zhang, Lei ; Yang, Zhemin ; He, Yuyu... - p. 1165-1178 , 2018
 
1-15